Get the report: How to Achieve CIO-CEO Alignment in the Era of AI

close
close
Your Network of Tomorrow
Your Network of Tomorrow
Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.
Experience Netskope
Get Hands-on With the Netskope Platform
Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
A Leader in SSE. Now a Leader in Single-Vendor SASE.
Netskope is recognized as a Leader Furthest in Vision for both SSE and SASE Platforms
2X a Leader in the Gartner® Magic Quadrant for SASE Platforms
One unified platform built for your journey
Securing Generative AI for Dummies
Securing Generative AI for Dummies
Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
Modern data loss prevention (DLP) for Dummies eBook
Modern Data Loss Prevention (DLP) for Dummies
Get tips and tricks for transitioning to a cloud-delivered DLP.
Modern SD-WAN for SASE Dummies Book
Modern SD-WAN for SASE Dummies
Stop playing catch up with your networking architecture
Understanding where the risk lies
Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
Netskope Technical Support
Netskope Technical Support
Our qualified support engineers are located worldwide and have diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ensuring timely and quality technical assistance
Netskope video
Netskope Training
Netskope training will help you become a cloud security expert. We are here to help you secure your digital transformation journey and make the most of your cloud, web, and private applications.

Cloud Threats Memo: Dridex Phishing Posing as COVID-19 Relief

Mar 19 2021

Not even seven days after its public release, the American Rescue Plan Act has already been exploited by cybercriminals. This is the latest example of using a relief measure as bait for phishing or malware delivery.

To go into more detail, a recent campaign is impersonating the US Internal Revenue Service, using their official logo and a spoofed domain. The email purports to offer an application for financial assistance, but in reality, the $4,000 stimulus check offered hides the Dridex banking trojan, delivered by exploiting a legitimate cloud service within the kill chain. Legitimate cloud services are implicitly trusted by the user and able to bypass legacy security technologies that don’t have instance detection capabilities and can’t perform TLS decryption at scale. Moreover, they offer an easy-to-setup infrastructure for the attackers.

The message contains a “Get apply form” button that, if clicked, takes the victim to a Dropbox account where an Excel document must be downloaded. You can easily imagine how the rest of the story goes: in order to read the document the user must enable the content of the document and this operation triggers the next steps of the infection chain, downloading an additional XLS document that exploits the Windows Management Instrumentation (WMI) to execute its Javascript code and retrieve the Dridex malware payload.

How Netskope Mitigates This Threat

Dropbox is one of the 2000+ services for which the Netskope Next Gen SWG can provide granular access control and instance detection. Netskope customers can easily configure a policy that applies a block or a user alert in case of potentially dangerous activities (such as download) performed on non-corporate cloud storage services, or non-corporate instances of approved cloud services.

Additionally, customers with the advanced threat protection license can leverage the machine learning engine to detect Office documents containing malicious macros, regardless of where they are downloaded from, whether it’s a traditional domain or a legitimate cloud service exploited by the threat actors to bypass legacy defenses.

Stay safe!

author image
Paolo Passeri
Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry.
Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry.
Connect with Netskope

Subscribe to the Netskope Blog

Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.